2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY) 2018
DOI: 10.1109/sisy.2018.8524756
|View full text |Cite
|
Sign up to set email alerts
|

Wiping Techniques and Anti-Forensics Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 8 publications
0
8
0
2
Order By: Relevance
“…• It may be a threat and used in a data breach to target the consequences and aftermath is discussed in the below points. The destruction of any information such as Personally Identifiable Information, Financial Information, Health Information, Competition Information, Legal Information, IT Security Data [6].…”
Section: Disadvantages or Redkey As A Threatmentioning
confidence: 99%
“…• It may be a threat and used in a data breach to target the consequences and aftermath is discussed in the below points. The destruction of any information such as Personally Identifiable Information, Financial Information, Health Information, Competition Information, Legal Information, IT Security Data [6].…”
Section: Disadvantages or Redkey As A Threatmentioning
confidence: 99%
“…As shown in Table 1, many wiping tools have been investigated including different versions of the same tool [12,[15][16][17][18][20][21][22]24]. These studies suggest investigating wiping tools using file system forensics for the Windows platform.…”
Section: Related Workmentioning
confidence: 99%
“…A study concluded that some tools perform poorly and lack the ability to wipe sensitive data raising questions about their reliability [15]. A study surveyed many data wiping techniques used by wiping tools and found that the most common technique used is DoD 5220.22 M [16]. This technique uses 3 passes, and the technique makes it impossible to recover the wiped data.…”
Section: Related Workmentioning
confidence: 99%
“…There are four types of anti‐forensic techniques, including artifact wiping, data hiding, trail obfuscation, and attacks against forensic technology [2, 3]. Among them, artifact wiping, particularly file‐wiping, can have a significant impact on forensic investigations as it overwrites the source of evidence with zeroes, known patterns, or random data [4, 5]. As it can erase evidence permanently, hinder investigations, and increase analysis time [6], determining whether the file‐wiping tool has been executed is crucial in digital forensics, which requires the rapid extraction of information from evidence.…”
Section: Introductionmentioning
confidence: 99%